General

  • Target

    c93208574c17d73f0e6b38a0fd4541c5396e0fac24b337f05c5c6f5d87653bd4

  • Size

    5.4MB

  • Sample

    241104-kb78taxfnc

  • MD5

    63244d51f20e41e971342724d077069d

  • SHA1

    039313797b893989b186864a18c930f6f026d32f

  • SHA256

    c93208574c17d73f0e6b38a0fd4541c5396e0fac24b337f05c5c6f5d87653bd4

  • SHA512

    f88f3d63ad7c92fc6a95932c696cdd06ec7a6f8a3436cbd592a5f2a2e947308367d826d865a4c423df6f9126cae1ca402d0445ea6974ef454116ad5d79339311

  • SSDEEP

    98304:QqSPEMlnomNMivQ9l+3N4l9MewiEIJ3+ImhOiqDbFIWzTSsR:5RmQy94vBj3+ImLCBIaSQ

Malware Config

Targets

    • Target

      c93208574c17d73f0e6b38a0fd4541c5396e0fac24b337f05c5c6f5d87653bd4

    • Size

      5.4MB

    • MD5

      63244d51f20e41e971342724d077069d

    • SHA1

      039313797b893989b186864a18c930f6f026d32f

    • SHA256

      c93208574c17d73f0e6b38a0fd4541c5396e0fac24b337f05c5c6f5d87653bd4

    • SHA512

      f88f3d63ad7c92fc6a95932c696cdd06ec7a6f8a3436cbd592a5f2a2e947308367d826d865a4c423df6f9126cae1ca402d0445ea6974ef454116ad5d79339311

    • SSDEEP

      98304:QqSPEMlnomNMivQ9l+3N4l9MewiEIJ3+ImhOiqDbFIWzTSsR:5RmQy94vBj3+ImLCBIaSQ

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks